1.1|
1.0|
0.16.x|
0.15.x|
0.14.x|
0.13.x|
0.12.x|
0.11.x|
0.10.x|
0.9.x|
0.8.x|
0.7.x|
Ancient|
Overview
Release Date: 2009-12-21
- Installation and Configuration changes
-
The following changes to local system installation are required:
- New features/enhancements
-
-
Support for various boolean flag LDAPv3 extended controls with a
nicer user interface.
-
If the DN of the user's entry could be determined after successful bind
this user entry is read and stored in the LDAPSession
instance for determining further user preferences and login data.
-
Added support for setting SHA-2 hash password values at the client-side
(schemes {SHA256}, {SSHA256}, etc.).
-
Added plugin module for Apple-specific attribute types.
- Dropped features
-
-
Support for setting the old and insecure LAN manager password hash
attribute lmPassword/sambaLMPassword along
with the userPassword was dropped.
- Changes in the UI
-
-
The connection type (LDAP, LDAP with StartTLS ext.op., LDAPS or LDAPI)
can now be specified in the connection form.
-
Specifying LDAP options/controls was moved from [ConnInfo]
into a separate module accessible via extra entry in the main menu.
-
When generating the object class select form the operational attribute
allowedChildClasses (e.g. available on MS AD)
is now honoured to determine which STRUCTURAL object classes are allowed
for the new subordinate entry.
-
When generating the input form vendor-specific operational attributes
are now honoured to determine whether an attribute is writeable
by the bound user. Otherwise only a read-only hidden field is displayed.
- allowedAttributesEffective
-
Tested with MS AD and OpenLDAP overlay slapo-allowed
(see also ITS#4730).
-
The schema browser is now directly accessible via extra entry
in the main menu.
-
Some improvements for setting the password of an user entry:
-
Hash settings are not displayed when changing unicodePwd
on MS AD
-
If the user changes his own password he can enter old password
for servers which need that (e.g. MS AD or Novell eDirectory).
A modify list with ldap.MOD_DEL and ldap.MOD_ADD
is generated then instead of ldap.MOD_REPLACE.
-
LDAP URLs shown in the UI now have SASL and StartTLS parameters set
which were used during connect and last login. This makes it easier
for the user to generate bookmark URLs containing StarTLS and SASL
bind information.
-
LDAP URL extension x-saslmech is now taken as default
for the bind mechanism select list in the login form.
-
[More] and [Fewer] in the advanced search form are now submit buttons
and thus user's input entered in the search form so far is preserved.
Empty user input is simply ignored and the advanced search form is
displayed again.
-
In the monitor web page the LDAP connections are now displayed as table.
-
The list of requested attributes when displaying a single entry
can now be altered in a simple input form below the displayed entry.
This is handy for attributes which have to be explicitly requested
to be returned by the server.
-
The submit button [Search] is now on top of all types of search forms.
- Bug fixes
-
-
Fixed behaviour when
Relax Rules Control is in effect.
-
Fixed regex-checking for attribute pgpKey.
-
Processing of .ldaprc or ldap.conf is now
explicitly switched off by setting environment variable LDAPNOINIT=1.
-
Fixed setting cert validation option for StartTLS ext.op. or LDAPS.
-
DESC fields of schema elements are now properly handled as UTF-8 and escaped.
- Code cleaning
-
-
Many changes/fixes towards a more consequent use of Unicode objects.
-
Completely reworked control parameter handling in [Params] for
setting controls (formerly in [ConnInfo].
-
Deprecated module sets is not imported anymore.
-
Removed unused functions in module msbase.
-
Removed unused functions in module ldaputil.base.
-
New submodule ldaputil.extldapurl.
-
Consequent use of BooleanType with values True
and False where appropriate.
-
Dropped support for reading cn=config attribute database
on old LDAPv2 Umich servers.
-
Caching was removed from class ldap.LDAPSession and is now solely
done in class ldapsession.LDAPObject. Uncaching single entries
is now more reliable in new method ldapsession.LDAPObject.uncache_entry().
-
Consistent use of module hashlib in Python's standard lib
also for MD4 so no need for installing additional modules for MD4 anymore.